• Home
  • About
  • Services
  • Store
  • Contact
  • Sign In My Account
Menu

SmithSec

Protect Your Small Business From Cybersecurity Threats
  • Home
  • About
  • Services
  • Store
  • Contact
  • Sign In My Account

 

Featured
Malware Defense: Ransomware Protection with SentinelOne
Aug 15, 2022
Malware Defense: Ransomware Protection with SentinelOne
Aug 15, 2022

Let’s see how SentinelOne handles a ransomware attack!

Aug 15, 2022
GhostPack: Windows Hacking with C#
Aug 2, 2022
GhostPack: Windows Hacking with C#
Aug 2, 2022

Let’s see how the C# programming language can be used to hack Windows systems!

Aug 2, 2022
Brute Forcing With BurpSuite
Jul 25, 2022
Brute Forcing With BurpSuite
Jul 25, 2022

Let’s see how BurpSuite can be used to brute force a login page!

Jul 25, 2022
Shellcode Execution with UUIDs
May 23, 2022
Shellcode Execution with UUIDs
May 23, 2022

Let’s see how UUIDs can be used to execute shellcode on Windows systems!

May 23, 2022
Network Hacking: The Importance of Encryption and HTTPS
May 16, 2022
Network Hacking: The Importance of Encryption and HTTPS
May 16, 2022

Let’s see the importance of encryption by taking a look at HTTPS!

May 16, 2022
Cloud Hacking: AWS Exploitation with Pacu
May 9, 2022
Cloud Hacking: AWS Exploitation with Pacu
May 9, 2022

Let’s see how Amazon Web Services (AWS) can be hacked using the Pacu tool!

May 9, 2022
Malware Debugging: C++ Reverse Shell
May 2, 2022
Malware Debugging: C++ Reverse Shell
May 2, 2022

Let’s see how a custom C++ reverse shell works using the Visual Studio debugger.

May 2, 2022
Instaloader: Downloading Instagram Profiles
Apr 25, 2022
Instaloader: Downloading Instagram Profiles
Apr 25, 2022

Let’s see how Instaloader can be used to download Instagram profiles!

Apr 25, 2022
WordPress Hacking with WPScan
Apr 18, 2022
WordPress Hacking with WPScan
Apr 18, 2022

Let’s see how a WordPress site can be exploited using the WPScan tool!

Apr 18, 2022
WiFi Cracking with Aircrack-ng
Apr 11, 2022
WiFi Cracking with Aircrack-ng
Apr 11, 2022

Let’s see how Aircrack-ng can be used to crack a WiFi password!

Apr 11, 2022
Malware Zoo: Playing with Ransomware
Apr 4, 2022
Malware Zoo: Playing with Ransomware
Apr 4, 2022

Let’s take a look at the Malware Zoo and see how the WannaCry ransomware infects systems!

Apr 4, 2022
Phishing With ZPhisher
Mar 28, 2022
Phishing With ZPhisher
Mar 28, 2022

Let’s see how ZPhisher can be used to collect usernames and passwords for commonly used websites!

Mar 28, 2022
Linux Privilege Escalation: Dirty Pipe
Mar 14, 2022
Linux Privilege Escalation: Dirty Pipe
Mar 14, 2022

Let’s see how the latest privilege escalation vulnerability works on Linux, and how it can be exploited!

Mar 14, 2022
SprayKatz: Mimikatz with ProcDump
Mar 7, 2022
SprayKatz: Mimikatz with ProcDump
Mar 7, 2022

Let’s see how SprayKatz can be used to get password hashes off a Windows system!

Mar 7, 2022
Windows Lateral Movement: WMIC and its Deprecation
Feb 28, 2022
Windows Lateral Movement: WMIC and its Deprecation
Feb 28, 2022

Let’s discuss Microsoft’s choice to deprecate WMIC.exe in regards to lateral movement

Feb 28, 2022
Microsoft Excel Hacking: Malicious Excel Macros
Feb 21, 2022
Microsoft Excel Hacking: Malicious Excel Macros
Feb 21, 2022

Let’s see how we can send a malicious payload through a Microsoft Excel document using macros!

Feb 21, 2022
Encrypted Shellcode: Advanced Metasploit Payloads
Feb 14, 2022
Encrypted Shellcode: Advanced Metasploit Payloads
Feb 14, 2022

Let’s see how Metasploit can generate encrypted shellcode that we can use in custom payloads!

Feb 14, 2022
Is it Possible to Install Metasploit on the iSH app?
Feb 7, 2022
Is it Possible to Install Metasploit on the iSH app?
Feb 7, 2022

Let’s see whether it’s possible to run Metasploit on the iSH app on iPhone!

Feb 7, 2022
Linux Privilege Escalation: Polkit pkexec Pwnkit - CVE-2021-4034
Jan 31, 2022
Linux Privilege Escalation: Polkit pkexec Pwnkit - CVE-2021-4034
Jan 31, 2022

Let’s see how to perform the latest privilege escalation exploit on Linux to gain root access!

Jan 31, 2022
Windows Hacking: Reconnaissance Tools
Jan 24, 2022
Windows Hacking: Reconnaissance Tools
Jan 24, 2022

Let’s see how to gain situational awareness of Windows environments by taking a look at three useful tools!

Jan 24, 2022
Kali Linux on Android: Using NetHunter Rootless
Jan 10, 2022
Kali Linux on Android: Using NetHunter Rootless
Jan 10, 2022

See how you can use Kali on the go using NetHunter Rootless!

Jan 10, 2022
Beginner Cybersecurity Questions: Career Edition
Jan 10, 2022
Beginner Cybersecurity Questions: Career Edition
Jan 10, 2022

Interested in the cybersecurity field as a career? Take a listen on our thoughts about the field!

Jan 10, 2022
Bypassing Antivirus: Using Veil Evasion
Dec 28, 2021
Bypassing Antivirus: Using Veil Evasion
Dec 28, 2021

Let’s see how to use the Veil Evasion tool!

Dec 28, 2021
Log4J Vulnerability: Fun with Java Exploitation
Dec 20, 2021
Log4J Vulnerability: Fun with Java Exploitation
Dec 20, 2021

Get a high level explanation about the Log4J vulnerability and see how it can be exploited!

Dec 20, 2021
iPhone Hacking: Command and Control with the Empire Framework
Dec 13, 2021
iPhone Hacking: Command and Control with the Empire Framework
Dec 13, 2021

Let’s see how we can establish command and control of an iPhone using Empire!

Dec 13, 2021
Vulnerability Scanning: Introduction to Nessus
Dec 6, 2021
Vulnerability Scanning: Introduction to Nessus
Dec 6, 2021

See how to initiate a vulnerability scan using Nessus Vulnerability Scanner!

Dec 6, 2021
Tesla Hacking: Controlling a Tesla with Python
Nov 15, 2021
Tesla Hacking: Controlling a Tesla with Python
Nov 15, 2021

See how you can control a Tesla vehicle using Python and TeslaPy!

Nov 15, 2021
Windows 11 Hacking: Testing Windows 11 Security
Nov 8, 2021
Windows 11 Hacking: Testing Windows 11 Security
Nov 8, 2021

Let’s see how Windows 11 fairs against modern hacking techniques!

Nov 8, 2021
Raspberry Pi Hacking with NMap
Oct 25, 2021
Raspberry Pi Hacking with NMap
Oct 25, 2021

Let's see the setup process of the Raspberry Pi Zero W and how we can use it to scan our home WiFi networks using NMap!

Oct 25, 2021
Netcat Reverse Shells: iPhone and iSH
Oct 18, 2021
Netcat Reverse Shells: iPhone and iSH
Oct 18, 2021

See how you can get a reverse shell on the iPhone using netcat and the iSH app!

Oct 18, 2021

Powered by Squarespace